* [PATCH] diff: fix out-of-bounds reads and NULL deref in diffstat UTF-8 truncation
@ 2026-04-17 16:26 Elijah Newren via GitGitGadget
2026-04-17 19:21 ` Junio C Hamano
2026-04-17 22:45 ` [PATCH v2] " Elijah Newren via GitGitGadget
0 siblings, 2 replies; 9+ messages in thread
From: Elijah Newren via GitGitGadget @ 2026-04-17 16:26 UTC (permalink / raw)
To: git; +Cc: LorenzoPegorari, Elijah Newren, Elijah Newren
From: Elijah Newren <newren@gmail.com>
f85b49f3d4a (diff: improve scaling of filenames in diffstat to handle
UTF-8 chars, 2024-10-27) introduced a loop in show_stats() that calls
utf8_width() repeatedly to skip leading characters until the displayed
width fits. However, utf8_width() can return problematic values:
- For invalid UTF-8 sequences, pick_one_utf8_char() sets the name
pointer to NULL and utf8_width() returns 0. Since name_len does
not change, the loop iterates once more and pick_one_utf8_char()
dereferences the NULL pointer, crashing.
- For control characters, utf8_width() returns -1, so name_len
grows when it is expected to shrink. This can cause the loop to
consume more characters than the string contains, reading past
the trailing NUL.
By default, fill_print_name() will C-quotes filenames which escapes
control characters and invalid bytes to printable text. That avoids
this bug from being triggered; however, with core.quotePath=false,
raw bytes can reach this code.
Add tests exercising both failure modes with core.quotePath=false and
a narrow --stat-name-width to force truncation: one with a bare 0xC0
byte (invalid UTF-8 lead byte, triggers NULL deref) and one with a
0x01 byte (control character, causes the loop to read past the end
of the string).
Fix the bug by:
- Adding a *name check to terminate the loop at end-of-string
- Detecting the NULL pointer from invalid UTF-8 and falling back to
showing the full untruncated name
- Breaking on negative width (control characters)
Signed-off-by: Elijah Newren <newren@gmail.com>
---
diff: fix out-of-bounds reads and NULL deref in diffstat UTF-8
truncation
Maintainer note: This is a new bug from the v2.54 cycle
Published-As: https://github.com/gitgitgadget/git/releases/tag/pr-2093%2Fnewren%2Ffix%2Fdiffstat-utf8-loop-v1
Fetch-It-Via: git fetch https://github.com/gitgitgadget/git pr-2093/newren/fix/diffstat-utf8-loop-v1
Pull-Request: https://github.com/gitgitgadget/git/pull/2093
diff.c | 13 +++++++++++--
t/t4052-stat-output.sh | 25 +++++++++++++++++++++++++
2 files changed, 36 insertions(+), 2 deletions(-)
diff --git a/diff.c b/diff.c
index 397e38b41c..7b27241733 100644
--- a/diff.c
+++ b/diff.c
@@ -3093,8 +3093,17 @@ static void show_stats(struct diffstat_t *data, struct diff_options *options)
if (len < 0)
len = 0;
- while (name_len > len)
- name_len -= utf8_width((const char**)&name, NULL);
+ while (name_len > len && *name) {
+ int w = utf8_width((const char **)&name, NULL);
+ if (!name) { /* Invalid UTF-8 */
+ name = file->print_name;
+ name_len = utf8_strwidth(name);
+ break;
+ }
+ if (w < 0) /* control character */
+ break;
+ name_len -= w;
+ }
slash = strchr(name, '/');
if (slash)
diff --git a/t/t4052-stat-output.sh b/t/t4052-stat-output.sh
index 7c749062e2..84c53c1a51 100755
--- a/t/t4052-stat-output.sh
+++ b/t/t4052-stat-output.sh
@@ -445,4 +445,29 @@ test_expect_success 'diffstat where line_prefix contains ANSI escape codes is co
test_grep "<RED>|<RESET> ${FILENAME_TRIMMED} | 0" out
'
+test_expect_success 'diffstat truncation with invalid UTF-8 does not crash' '
+ empty_blob=$(git hash-object -w --stdin </dev/null) &&
+ printf "100644 blob $empty_blob\taaa-\300-aaa\n" |
+ git mktree >tree_file &&
+ tree=$(cat tree_file) &&
+ empty_tree=$(git mktree </dev/null) &&
+ c1=$(git commit-tree -m before $empty_tree) &&
+ c2=$(git commit-tree -m after -p $c1 $tree) &&
+ git -c core.quotepath=false diff --stat --stat-name-width=5 $c1..$c2 >output &&
+ test_grep "| 0" output
+'
+
+test_expect_success FUNNYNAMES 'diffstat truncation with control chars does not crash' '
+ FNAME=$(printf "aaa-\x01-aaa") &&
+ git commit --allow-empty -m setup &&
+ >$FNAME &&
+ git add -- $FNAME &&
+ git commit -m "add file with control char name" &&
+ git -c core.quotepath=false diff --stat --stat-name-width=5 HEAD~1..HEAD >output &&
+ test_grep "| 0" output &&
+ rm -- $FNAME &&
+ git rm -- $FNAME &&
+ git commit -m "remove test file"
+'
+
test_done
base-commit: 9f223ef1c026d91c7ac68cc0211bde255dda6199
--
gitgitgadget
^ permalink raw reply related [flat|nested] 9+ messages in thread* Re: [PATCH] diff: fix out-of-bounds reads and NULL deref in diffstat UTF-8 truncation 2026-04-17 16:26 [PATCH] diff: fix out-of-bounds reads and NULL deref in diffstat UTF-8 truncation Elijah Newren via GitGitGadget @ 2026-04-17 19:21 ` Junio C Hamano 2026-04-17 22:00 ` Elijah Newren 2026-04-17 22:45 ` [PATCH v2] " Elijah Newren via GitGitGadget 1 sibling, 1 reply; 9+ messages in thread From: Junio C Hamano @ 2026-04-17 19:21 UTC (permalink / raw) To: Elijah Newren via GitGitGadget; +Cc: git, LorenzoPegorari, Elijah Newren "Elijah Newren via GitGitGadget" <gitgitgadget@gmail.com> writes: > From: Elijah Newren <newren@gmail.com> > > f85b49f3d4a (diff: improve scaling of filenames in diffstat to handle > UTF-8 chars, 2024-10-27) introduced a loop in show_stats() that calls > utf8_width() repeatedly to skip leading characters until the displayed > width fits. A tangent, but I get a datestamp for the same f85b49f3 (diff: improve scaling of filenames in diffstat to handle UTF-8 chars, 2026-01-16) that is different from what you showed above. Did you find a bug in "git show -s --pretty=reference"? > diff --git a/diff.c b/diff.c > index 397e38b41c..7b27241733 100644 > --- a/diff.c > +++ b/diff.c > @@ -3093,8 +3093,17 @@ static void show_stats(struct diffstat_t *data, struct diff_options *options) > if (len < 0) > len = 0; > > - while (name_len > len) > - name_len -= utf8_width((const char**)&name, NULL); > + while (name_len > len && *name) { > + int w = utf8_width((const char **)&name, NULL); > + if (!name) { /* Invalid UTF-8 */ > + name = file->print_name; > + name_len = utf8_strwidth(name); > + break; > + } IOW, we punt on "scaling" and instead use the full string? I was wondering if we can punt on only this segment by replacing this segment with just "..." and resync at the next slash. > + if (w < 0) /* control character */ > + break; When we have a control characer, we instead chomp immediately before that byte, which sounds good. But then wouldn't the loop that found an Invalid UTF-8 sequence in the middle of a name want to do the same, i.e., take the good bits found so far and chomp at the broken byte? > + name_len -= w; > + } > > slash = strchr(name, '/'); > if (slash) Thanks. ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [PATCH] diff: fix out-of-bounds reads and NULL deref in diffstat UTF-8 truncation 2026-04-17 19:21 ` Junio C Hamano @ 2026-04-17 22:00 ` Elijah Newren 2026-04-17 22:21 ` Junio C Hamano 0 siblings, 1 reply; 9+ messages in thread From: Elijah Newren @ 2026-04-17 22:00 UTC (permalink / raw) To: Junio C Hamano; +Cc: Elijah Newren via GitGitGadget, git, LorenzoPegorari On Fri, Apr 17, 2026 at 12:21 PM Junio C Hamano <gitster@pobox.com> wrote: > > "Elijah Newren via GitGitGadget" <gitgitgadget@gmail.com> writes: > > > From: Elijah Newren <newren@gmail.com> > > > > f85b49f3d4a (diff: improve scaling of filenames in diffstat to handle > > UTF-8 chars, 2024-10-27) introduced a loop in show_stats() that calls > > utf8_width() repeatedly to skip leading characters until the displayed > > width fits. > > A tangent, but I get a datestamp for the same f85b49f3 (diff: > improve scaling of filenames in diffstat to handle UTF-8 chars, > 2026-01-16) that is different from what you showed above. Did you > find a bug in "git show -s --pretty=reference"? Hmm, indeed I get 2026-01-16 as well; I'm not sure what happened there. > > diff --git a/diff.c b/diff.c > > index 397e38b41c..7b27241733 100644 > > --- a/diff.c > > +++ b/diff.c > > @@ -3093,8 +3093,17 @@ static void show_stats(struct diffstat_t *data, struct diff_options *options) > > if (len < 0) > > len = 0; > > > > - while (name_len > len) > > - name_len -= utf8_width((const char**)&name, NULL); > > + while (name_len > len && *name) { > > > > > + int w = utf8_width((const char **)&name, NULL); > > + if (!name) { /* Invalid UTF-8 */ > > + name = file->print_name; > > + name_len = utf8_strwidth(name); > > + break; > > + } > > IOW, we punt on "scaling" and instead use the full string? I was > wondering if we can punt on only this segment by replacing this > segment with just "..." and resync at the next slash. Good point. Alternatively, perhaps I could just add a wrapper around utf8_width() which never sets name to NULL and never returns a negative value, and then use the original loop as-is other than calling the new function? > > > + if (w < 0) /* control character */ > > + break; > > When we have a control characer, we instead chomp immediately before > that byte, which sounds good. But then wouldn't the loop that found > an Invalid UTF-8 sequence in the middle of a name want to do the > same, i.e., take the good bits found so far and chomp at the broken > byte? Makes sense, though I think my simpler alternative might be easier. I'll send in a re-roll. > > > + name_len -= w; > > + } > > > > slash = strchr(name, '/'); > > if (slash) > > Thanks. ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [PATCH] diff: fix out-of-bounds reads and NULL deref in diffstat UTF-8 truncation 2026-04-17 22:00 ` Elijah Newren @ 2026-04-17 22:21 ` Junio C Hamano 0 siblings, 0 replies; 9+ messages in thread From: Junio C Hamano @ 2026-04-17 22:21 UTC (permalink / raw) To: Elijah Newren; +Cc: Elijah Newren via GitGitGadget, git, LorenzoPegorari Elijah Newren <newren@gmail.com> writes: > Makes sense, though I think my simpler alternative might be easier. > I'll send in a re-roll. As long as "an invalid UTF-8" and "a control character" behaves more or less the same (i.e., "eek, we cannot measure the width of the UTF-8 character at this byte position, so let's do X as a fallback", where X is the same regardless of the exact reason why we cannot measure the width), I'll be happy. If we see a slash after the problematic position, advancing to that slash might be the simplest, as that is in line with how the code works when there is no such problem, but we also need to be prepared for a filename whose last component is sufficiently long that we see no such slash after the problematic byte. ^ permalink raw reply [flat|nested] 9+ messages in thread
* [PATCH v2] diff: fix out-of-bounds reads and NULL deref in diffstat UTF-8 truncation 2026-04-17 16:26 [PATCH] diff: fix out-of-bounds reads and NULL deref in diffstat UTF-8 truncation Elijah Newren via GitGitGadget 2026-04-17 19:21 ` Junio C Hamano @ 2026-04-17 22:45 ` Elijah Newren via GitGitGadget 2026-04-19 23:52 ` Lorenzo Pegorari 2026-04-20 15:42 ` [PATCH v3] " Elijah Newren via GitGitGadget 1 sibling, 2 replies; 9+ messages in thread From: Elijah Newren via GitGitGadget @ 2026-04-17 22:45 UTC (permalink / raw) To: git; +Cc: LorenzoPegorari, Elijah Newren, Elijah Newren, Elijah Newren From: Elijah Newren <newren@gmail.com> f85b49f3d4a (diff: improve scaling of filenames in diffstat to handle UTF-8 chars, 2026-01-16) introduced a loop in show_stats() that calls utf8_width() repeatedly to skip leading characters until the displayed width fits. However, utf8_width() can return problematic values: - For invalid UTF-8 sequences, pick_one_utf8_char() sets the name pointer to NULL and utf8_width() returns 0. Since name_len does not change, the loop iterates once more and pick_one_utf8_char() dereferences the NULL pointer, crashing. - For control characters, utf8_width() returns -1, so name_len grows when it is expected to shrink. This can cause the loop to consume more characters than the string contains, reading past the trailing NUL. By default, fill_print_name() will C-quotes filenames which escapes control characters and invalid bytes to printable text. That avoids this bug from being triggered; however, with core.quotePath=false, raw bytes can reach this code. Add tests exercising both failure modes with core.quotePath=false and a narrow --stat-name-width to force truncation: one with a bare 0xC0 byte (invalid UTF-8 lead byte, triggers NULL deref) and one with a 0x01 byte (control character, causes the loop to read past the end of the string). Fix both issues by introducing utf8_ish_width(), a thin wrapper around utf8_width() that guarantees the pointer always advances and the returned width is never negative: - On invalid UTF-8 it restores the pointer, advances by one byte, and returns width 1 (matching the strlen()-based fallback used by utf8_strwidth()). - On a control character it returns 0 (matching utf8_strnwidth() which skips them). Also add a "&& *name" guard to the while-loop condition so it terminates at end-of-string even when utf8_strwidth()'s strlen() fallback causes name_len to exceed the sum of per-character widths. Signed-off-by: Elijah Newren <newren@gmail.com> --- diff: fix out-of-bounds reads and NULL deref in diffstat UTF-8 truncation Changes since v1: * Simplified the loop to almost what we had before via a wrapper function that always succeeds in advancing the string and never returns a negative width. (Which, as a consequence, treats invalid UTF-8 and control characters the roughly the same, unlike v1.) Published-As: https://github.com/gitgitgadget/git/releases/tag/pr-2093%2Fnewren%2Ffix%2Fdiffstat-utf8-loop-v2 Fetch-It-Via: git fetch https://github.com/gitgitgadget/git pr-2093/newren/fix/diffstat-utf8-loop-v2 Pull-Request: https://github.com/gitgitgadget/git/pull/2093 Range-diff vs v1: 1: fcd44d6cf8 ! 1: 4a72647ce2 diff: fix out-of-bounds reads and NULL deref in diffstat UTF-8 truncation @@ Commit message diff: fix out-of-bounds reads and NULL deref in diffstat UTF-8 truncation f85b49f3d4a (diff: improve scaling of filenames in diffstat to handle - UTF-8 chars, 2024-10-27) introduced a loop in show_stats() that calls + UTF-8 chars, 2026-01-16) introduced a loop in show_stats() that calls utf8_width() repeatedly to skip leading characters until the displayed width fits. However, utf8_width() can return problematic values: @@ Commit message 0x01 byte (control character, causes the loop to read past the end of the string). - Fix the bug by: - - Adding a *name check to terminate the loop at end-of-string - - Detecting the NULL pointer from invalid UTF-8 and falling back to - showing the full untruncated name - - Breaking on negative width (control characters) + Fix both issues by introducing utf8_ish_width(), a thin wrapper + around utf8_width() that guarantees the pointer always advances and + the returned width is never negative: + + - On invalid UTF-8 it restores the pointer, advances by one byte, + and returns width 1 (matching the strlen()-based fallback used + by utf8_strwidth()). + - On a control character it returns 0 (matching utf8_strnwidth() + which skips them). + + Also add a "&& *name" guard to the while-loop condition so it + terminates at end-of-string even when utf8_strwidth()'s strlen() + fallback causes name_len to exceed the sum of per-character widths. Signed-off-by: Elijah Newren <newren@gmail.com> ## diff.c ## +@@ diff.c: void print_stat_summary(FILE *fp, int files, + print_stat_summary_inserts_deletes(&o, files, insertions, deletions); + } + ++/* ++ * Like utf8_width(), but guaranteed safe for use in loops that subtract ++ * per-character widths: ++ * ++ * - utf8_width() sets *start to NULL on invalid UTF-8 and returns 0; ++ * we restore the pointer and advance by one byte, returning width 1 ++ * (matching the strlen()-based fallback in utf8_strwidth()). ++ * ++ * - utf8_width() returns -1 for control characters; we return 0 ++ * (matching utf8_strnwidth() which skips them). ++ */ ++static int utf8_ish_width(const char **start) ++{ ++ const char *old = *start; ++ int w = utf8_width(start, NULL); ++ if (!*start) { ++ *start = old + 1; ++ return 1; ++ } ++ return (w < 0) ? 0 : w; ++} ++ + static void show_stats(struct diffstat_t *data, struct diff_options *options) + { + int i, len, add, del, adds = 0, dels = 0; @@ diff.c: static void show_stats(struct diffstat_t *data, struct diff_options *options) if (len < 0) len = 0; - while (name_len > len) - name_len -= utf8_width((const char**)&name, NULL); -+ while (name_len > len && *name) { -+ int w = utf8_width((const char **)&name, NULL); -+ if (!name) { /* Invalid UTF-8 */ -+ name = file->print_name; -+ name_len = utf8_strwidth(name); -+ break; -+ } -+ if (w < 0) /* control character */ -+ break; -+ name_len -= w; -+ } ++ while (name_len > len && *name) ++ name_len -= utf8_ish_width((const char**)&name); slash = strchr(name, '/'); if (slash) diff.c | 26 ++++++++++++++++++++++++-- t/t4052-stat-output.sh | 25 +++++++++++++++++++++++++ 2 files changed, 49 insertions(+), 2 deletions(-) diff --git a/diff.c b/diff.c index 397e38b41c..1a3b19f71f 100644 --- a/diff.c +++ b/diff.c @@ -2927,6 +2927,28 @@ void print_stat_summary(FILE *fp, int files, print_stat_summary_inserts_deletes(&o, files, insertions, deletions); } +/* + * Like utf8_width(), but guaranteed safe for use in loops that subtract + * per-character widths: + * + * - utf8_width() sets *start to NULL on invalid UTF-8 and returns 0; + * we restore the pointer and advance by one byte, returning width 1 + * (matching the strlen()-based fallback in utf8_strwidth()). + * + * - utf8_width() returns -1 for control characters; we return 0 + * (matching utf8_strnwidth() which skips them). + */ +static int utf8_ish_width(const char **start) +{ + const char *old = *start; + int w = utf8_width(start, NULL); + if (!*start) { + *start = old + 1; + return 1; + } + return (w < 0) ? 0 : w; +} + static void show_stats(struct diffstat_t *data, struct diff_options *options) { int i, len, add, del, adds = 0, dels = 0; @@ -3093,8 +3115,8 @@ static void show_stats(struct diffstat_t *data, struct diff_options *options) if (len < 0) len = 0; - while (name_len > len) - name_len -= utf8_width((const char**)&name, NULL); + while (name_len > len && *name) + name_len -= utf8_ish_width((const char**)&name); slash = strchr(name, '/'); if (slash) diff --git a/t/t4052-stat-output.sh b/t/t4052-stat-output.sh index 7c749062e2..84c53c1a51 100755 --- a/t/t4052-stat-output.sh +++ b/t/t4052-stat-output.sh @@ -445,4 +445,29 @@ test_expect_success 'diffstat where line_prefix contains ANSI escape codes is co test_grep "<RED>|<RESET> ${FILENAME_TRIMMED} | 0" out ' +test_expect_success 'diffstat truncation with invalid UTF-8 does not crash' ' + empty_blob=$(git hash-object -w --stdin </dev/null) && + printf "100644 blob $empty_blob\taaa-\300-aaa\n" | + git mktree >tree_file && + tree=$(cat tree_file) && + empty_tree=$(git mktree </dev/null) && + c1=$(git commit-tree -m before $empty_tree) && + c2=$(git commit-tree -m after -p $c1 $tree) && + git -c core.quotepath=false diff --stat --stat-name-width=5 $c1..$c2 >output && + test_grep "| 0" output +' + +test_expect_success FUNNYNAMES 'diffstat truncation with control chars does not crash' ' + FNAME=$(printf "aaa-\x01-aaa") && + git commit --allow-empty -m setup && + >$FNAME && + git add -- $FNAME && + git commit -m "add file with control char name" && + git -c core.quotepath=false diff --stat --stat-name-width=5 HEAD~1..HEAD >output && + test_grep "| 0" output && + rm -- $FNAME && + git rm -- $FNAME && + git commit -m "remove test file" +' + test_done base-commit: 9f223ef1c026d91c7ac68cc0211bde255dda6199 -- gitgitgadget ^ permalink raw reply related [flat|nested] 9+ messages in thread
* Re: [PATCH v2] diff: fix out-of-bounds reads and NULL deref in diffstat UTF-8 truncation 2026-04-17 22:45 ` [PATCH v2] " Elijah Newren via GitGitGadget @ 2026-04-19 23:52 ` Lorenzo Pegorari 2026-04-20 14:51 ` Elijah Newren 2026-04-20 15:42 ` [PATCH v3] " Elijah Newren via GitGitGadget 1 sibling, 1 reply; 9+ messages in thread From: Lorenzo Pegorari @ 2026-04-19 23:52 UTC (permalink / raw) To: Elijah Newren via GitGitGadget; +Cc: git, Elijah Newren On Fri, Apr 17, 2026 at 10:45:10PM +0000, Elijah Newren via GitGitGadget wrote: > From: Elijah Newren <newren@gmail.com> > > f85b49f3d4a (diff: improve scaling of filenames in diffstat to handle > UTF-8 chars, 2026-01-16) introduced a loop in show_stats() that calls > utf8_width() repeatedly to skip leading characters until the displayed > width fits. However, utf8_width() can return problematic values: > > - For invalid UTF-8 sequences, pick_one_utf8_char() sets the name > pointer to NULL and utf8_width() returns 0. Since name_len does > not change, the loop iterates once more and pick_one_utf8_char() > dereferences the NULL pointer, crashing. > > - For control characters, utf8_width() returns -1, so name_len > grows when it is expected to shrink. This can cause the loop to > consume more characters than the string contains, reading past > the trailing NUL. > > By default, fill_print_name() will C-quotes filenames which escapes > control characters and invalid bytes to printable text. That avoids > this bug from being triggered; however, with core.quotePath=false, > raw bytes can reach this code. > > Add tests exercising both failure modes with core.quotePath=false and > a narrow --stat-name-width to force truncation: one with a bare 0xC0 > byte (invalid UTF-8 lead byte, triggers NULL deref) and one with a > 0x01 byte (control character, causes the loop to read past the end > of the string). > > Fix both issues by introducing utf8_ish_width(), a thin wrapper > around utf8_width() that guarantees the pointer always advances and > the returned width is never negative: > > - On invalid UTF-8 it restores the pointer, advances by one byte, > and returns width 1 (matching the strlen()-based fallback used > by utf8_strwidth()). > - On a control character it returns 0 (matching utf8_strnwidth() > which skips them). > > Also add a "&& *name" guard to the while-loop condition so it > terminates at end-of-string even when utf8_strwidth()'s strlen() > fallback causes name_len to exceed the sum of per-character widths. i> > Signed-off-by: Elijah Newren <newren@gmail.com> Hi, thanks for CCing me and thanks for improving on my previous work. All of these changes make a lot of sense, and indeed they fix issues that I didn't consider in f85b49f3d4a (diff: improve scaling of filenames in diffstat to handle UTF-8 chars, 2026-01-16). [...] > diff --git a/t/t4052-stat-output.sh b/t/t4052-stat-output.sh > index 7c749062e2..84c53c1a51 100755 > --- a/t/t4052-stat-output.sh > +++ b/t/t4052-stat-output.sh > @@ -445,4 +445,29 @@ test_expect_success 'diffstat where line_prefix contains ANSI escape codes is co [...] > > +test_expect_success FUNNYNAMES 'diffstat truncation with control chars does not crash' ' > + FNAME=$(printf "aaa-\x01-aaa") && > + git commit --allow-empty -m setup && > + >$FNAME && > + git add -- $FNAME && > + git commit -m "add file with control char name" && > + git -c core.quotepath=false diff --stat --stat-name-width=5 HEAD~1..HEAD >output && > + test_grep "| 0" output && > + rm -- $FNAME && > + git rm -- $FNAME && > + git commit -m "remove test file" > +' > + > test_done The only thing that I don't quite understand is this second test. From my tests, the previous code using: ``` [...] while (name_len > len) name_len -= utf8_width((const char**)&name, NULL); [...] ``` passes this second test just fine, while I believe it's supposed to fail. Am I missing something? Thanks, Lorenzo ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [PATCH v2] diff: fix out-of-bounds reads and NULL deref in diffstat UTF-8 truncation 2026-04-19 23:52 ` Lorenzo Pegorari @ 2026-04-20 14:51 ` Elijah Newren 0 siblings, 0 replies; 9+ messages in thread From: Elijah Newren @ 2026-04-20 14:51 UTC (permalink / raw) To: Lorenzo Pegorari; +Cc: Elijah Newren via GitGitGadget, git On Sun, Apr 19, 2026 at 4:52 PM Lorenzo Pegorari <lorenzo.pegorari2002@gmail.com> wrote: > > > +test_expect_success FUNNYNAMES 'diffstat truncation with control chars does not crash' ' > > + FNAME=$(printf "aaa-\x01-aaa") && > > + git commit --allow-empty -m setup && > > + >$FNAME && > > + git add -- $FNAME && > > + git commit -m "add file with control char name" && > > + git -c core.quotepath=false diff --stat --stat-name-width=5 HEAD~1..HEAD >output && > > + test_grep "| 0" output && > > + rm -- $FNAME && > > + git rm -- $FNAME && > > + git commit -m "remove test file" > > +' > > + > > test_done > > The only thing that I don't quite understand is this second test. > > From my tests, the previous code using: > > ``` > [...] > while (name_len > len) > name_len -= utf8_width((const char**)&name, NULL); > [...] > ``` > > passes this second test just fine, while I believe it's supposed to > fail. > > Am I missing something? Sorry, I did two things wrong -- I forgot to specify that the second test only fails under ASan, and I simplified the test too much such that it doesn't fail under ASan without the fixes (and simplified in three wrong ways: not enough control characters, wrong kind of control character, attempting to use hex control code to printf instead of octal) and apparently forgot to re-check afterwards. Using the filename FNAME=$(printf "aaa-\302\237\302\237\302\237-aaa") && will trigger the out-of-bounds read under ASan before the fixes; removing the final \302\237 will make it pass with or without the code fixes. I'll correct the patch and send in a new round. Thanks for checking closely. ^ permalink raw reply [flat|nested] 9+ messages in thread
* [PATCH v3] diff: fix out-of-bounds reads and NULL deref in diffstat UTF-8 truncation 2026-04-17 22:45 ` [PATCH v2] " Elijah Newren via GitGitGadget 2026-04-19 23:52 ` Lorenzo Pegorari @ 2026-04-20 15:42 ` Elijah Newren via GitGitGadget 2026-04-20 16:41 ` Junio C Hamano 1 sibling, 1 reply; 9+ messages in thread From: Elijah Newren via GitGitGadget @ 2026-04-20 15:42 UTC (permalink / raw) To: git; +Cc: LorenzoPegorari, Elijah Newren, Elijah Newren, Elijah Newren From: Elijah Newren <newren@gmail.com> f85b49f3d4a (diff: improve scaling of filenames in diffstat to handle UTF-8 chars, 2026-01-16) introduced a loop in show_stats() that calls utf8_width() repeatedly to skip leading characters until the displayed width fits. However, utf8_width() can return problematic values: - For invalid UTF-8 sequences, pick_one_utf8_char() sets the name pointer to NULL and utf8_width() returns 0. Since name_len does not change, the loop iterates once more and pick_one_utf8_char() dereferences the NULL pointer, crashing. - For control characters, utf8_width() returns -1, so name_len grows when it is expected to shrink. This can cause the loop to consume more characters than the string contains, reading past the trailing NUL. By default, fill_print_name() will C-quote filenames which escapes control characters and invalid bytes to printable text. That avoids this bug from being triggered; however, with core.quotePath=false, most characters are no longer escaped (though some control characters still are) and raw bytes can reach this code. Add tests exercising both failure modes with core.quotePath=false and a narrow --stat-name-width to force truncation: one with a bare 0xC0 byte (invalid UTF-8 lead byte, triggers NULL deref) and one with several C1 control characters (repeats of 0xC2 0x9F, causing the loop to read past the end of the string). The second test reliably catches the out-of-bounds read when run under ASan, though it may pass silently without sanitizers. Fix both issues by introducing utf8_ish_width(), a thin wrapper around utf8_width() that guarantees the pointer always advances and the returned width is never negative: - On invalid UTF-8 it restores the pointer, advances by one byte, and returns width 1 (matching the strlen()-based fallback used by utf8_strwidth()). - On a control character it returns 0 (matching utf8_strnwidth() which skips them). Also add a "&& *name" guard to the while-loop condition so it terminates at end-of-string even when utf8_strwidth()'s strlen() fallback causes name_len to exceed the sum of per-character widths. Signed-off-by: Elijah Newren <newren@gmail.com> --- diff: fix out-of-bounds reads and NULL deref in diffstat UTF-8 truncation Changes since v2: * Fixed the filename in the final test such that it will trigger the out-of-bounds read under ASan, and updated the commit message to point out that ASan is needed to notice the out-of-bounds read. Changes since v1: * Simplified the loop to almost what we had before via a wrapper function that always succeeds in advancing the string and never returns a negative width. (Which, as a consequence, treats invalid UTF-8 and control characters the roughly the same, unlike v1.) Published-As: https://github.com/gitgitgadget/git/releases/tag/pr-2093%2Fnewren%2Ffix%2Fdiffstat-utf8-loop-v3 Fetch-It-Via: git fetch https://github.com/gitgitgadget/git pr-2093/newren/fix/diffstat-utf8-loop-v3 Pull-Request: https://github.com/gitgitgadget/git/pull/2093 Range-diff vs v2: 1: 4a72647ce2 ! 1: 4a3126720b diff: fix out-of-bounds reads and NULL deref in diffstat UTF-8 truncation @@ Commit message consume more characters than the string contains, reading past the trailing NUL. - By default, fill_print_name() will C-quotes filenames which escapes + By default, fill_print_name() will C-quote filenames which escapes control characters and invalid bytes to printable text. That avoids this bug from being triggered; however, with core.quotePath=false, - raw bytes can reach this code. + most characters are no longer escaped (though some control characters + still are) and raw bytes can reach this code. Add tests exercising both failure modes with core.quotePath=false and a narrow --stat-name-width to force truncation: one with a bare 0xC0 - byte (invalid UTF-8 lead byte, triggers NULL deref) and one with a - 0x01 byte (control character, causes the loop to read past the end - of the string). + byte (invalid UTF-8 lead byte, triggers NULL deref) and one with + several C1 control characters (repeats of 0xC2 0x9F, causing + the loop to read past the end of the string). The second test + reliably catches the out-of-bounds read when run under ASan, though + it may pass silently without sanitizers. Fix both issues by introducing utf8_ish_width(), a thin wrapper around utf8_width() that guarantees the pointer always advances and @@ t/t4052-stat-output.sh: test_expect_success 'diffstat where line_prefix contains + test_grep "| 0" output +' + -+test_expect_success FUNNYNAMES 'diffstat truncation with control chars does not crash' ' -+ FNAME=$(printf "aaa-\x01-aaa") && ++test_expect_success FUNNYNAMES 'diffstat truncation with control chars does not read out of bounds' ' ++ FNAME=$(printf "aaa-\302\237\302\237\302\237-aaa") && + git commit --allow-empty -m setup && + >$FNAME && + git add -- $FNAME && diff.c | 26 ++++++++++++++++++++++++-- t/t4052-stat-output.sh | 25 +++++++++++++++++++++++++ 2 files changed, 49 insertions(+), 2 deletions(-) diff --git a/diff.c b/diff.c index 397e38b41c..1a3b19f71f 100644 --- a/diff.c +++ b/diff.c @@ -2927,6 +2927,28 @@ void print_stat_summary(FILE *fp, int files, print_stat_summary_inserts_deletes(&o, files, insertions, deletions); } +/* + * Like utf8_width(), but guaranteed safe for use in loops that subtract + * per-character widths: + * + * - utf8_width() sets *start to NULL on invalid UTF-8 and returns 0; + * we restore the pointer and advance by one byte, returning width 1 + * (matching the strlen()-based fallback in utf8_strwidth()). + * + * - utf8_width() returns -1 for control characters; we return 0 + * (matching utf8_strnwidth() which skips them). + */ +static int utf8_ish_width(const char **start) +{ + const char *old = *start; + int w = utf8_width(start, NULL); + if (!*start) { + *start = old + 1; + return 1; + } + return (w < 0) ? 0 : w; +} + static void show_stats(struct diffstat_t *data, struct diff_options *options) { int i, len, add, del, adds = 0, dels = 0; @@ -3093,8 +3115,8 @@ static void show_stats(struct diffstat_t *data, struct diff_options *options) if (len < 0) len = 0; - while (name_len > len) - name_len -= utf8_width((const char**)&name, NULL); + while (name_len > len && *name) + name_len -= utf8_ish_width((const char**)&name); slash = strchr(name, '/'); if (slash) diff --git a/t/t4052-stat-output.sh b/t/t4052-stat-output.sh index 7c749062e2..e009585925 100755 --- a/t/t4052-stat-output.sh +++ b/t/t4052-stat-output.sh @@ -445,4 +445,29 @@ test_expect_success 'diffstat where line_prefix contains ANSI escape codes is co test_grep "<RED>|<RESET> ${FILENAME_TRIMMED} | 0" out ' +test_expect_success 'diffstat truncation with invalid UTF-8 does not crash' ' + empty_blob=$(git hash-object -w --stdin </dev/null) && + printf "100644 blob $empty_blob\taaa-\300-aaa\n" | + git mktree >tree_file && + tree=$(cat tree_file) && + empty_tree=$(git mktree </dev/null) && + c1=$(git commit-tree -m before $empty_tree) && + c2=$(git commit-tree -m after -p $c1 $tree) && + git -c core.quotepath=false diff --stat --stat-name-width=5 $c1..$c2 >output && + test_grep "| 0" output +' + +test_expect_success FUNNYNAMES 'diffstat truncation with control chars does not read out of bounds' ' + FNAME=$(printf "aaa-\302\237\302\237\302\237-aaa") && + git commit --allow-empty -m setup && + >$FNAME && + git add -- $FNAME && + git commit -m "add file with control char name" && + git -c core.quotepath=false diff --stat --stat-name-width=5 HEAD~1..HEAD >output && + test_grep "| 0" output && + rm -- $FNAME && + git rm -- $FNAME && + git commit -m "remove test file" +' + test_done base-commit: 9f223ef1c026d91c7ac68cc0211bde255dda6199 -- gitgitgadget ^ permalink raw reply related [flat|nested] 9+ messages in thread
* Re: [PATCH v3] diff: fix out-of-bounds reads and NULL deref in diffstat UTF-8 truncation 2026-04-20 15:42 ` [PATCH v3] " Elijah Newren via GitGitGadget @ 2026-04-20 16:41 ` Junio C Hamano 0 siblings, 0 replies; 9+ messages in thread From: Junio C Hamano @ 2026-04-20 16:41 UTC (permalink / raw) To: Elijah Newren via GitGitGadget; +Cc: git, LorenzoPegorari, Elijah Newren "Elijah Newren via GitGitGadget" <gitgitgadget@gmail.com> writes: > From: Elijah Newren <newren@gmail.com> > > f85b49f3d4a (diff: improve scaling of filenames in diffstat to handle > UTF-8 chars, 2026-01-16) introduced a loop in show_stats() that calls > utf8_width() repeatedly to skip leading characters until the displayed > width fits. However, utf8_width() can return problematic values: > > - For invalid UTF-8 sequences, pick_one_utf8_char() sets the name > pointer to NULL and utf8_width() returns 0. Since name_len does > not change, the loop iterates once more and pick_one_utf8_char() > dereferences the NULL pointer, crashing. > > - For control characters, utf8_width() returns -1, so name_len > grows when it is expected to shrink. This can cause the loop to > consume more characters than the string contains, reading past > the trailing NUL. > > By default, fill_print_name() will C-quote filenames which escapes > control characters and invalid bytes to printable text. That avoids > this bug from being triggered; however, with core.quotePath=false, > most characters are no longer escaped (though some control characters > still are) and raw bytes can reach this code. > > Add tests exercising both failure modes with core.quotePath=false and > a narrow --stat-name-width to force truncation: one with a bare 0xC0 > byte (invalid UTF-8 lead byte, triggers NULL deref) and one with > several C1 control characters (repeats of 0xC2 0x9F, causing > the loop to read past the end of the string). The second test > reliably catches the out-of-bounds read when run under ASan, though > it may pass silently without sanitizers. > > Fix both issues by introducing utf8_ish_width(), a thin wrapper > around utf8_width() that guarantees the pointer always advances and > the returned width is never negative: > > - On invalid UTF-8 it restores the pointer, advances by one byte, > and returns width 1 (matching the strlen()-based fallback used > by utf8_strwidth()). > - On a control character it returns 0 (matching utf8_strnwidth() > which skips them). > > Also add a "&& *name" guard to the while-loop condition so it > terminates at end-of-string even when utf8_strwidth()'s strlen() > fallback causes name_len to exceed the sum of per-character widths. OK, that does sounds sensible. If we start from a valid UTF-8 string, chomp a few bytes from the tail end of it, and feed it into this loop, the initial part of the last character is fed to utf8_width(), which hopefully is already prepared to honor the NUL termination to avoid an OOB read while returning an error. And eventually we would see that NUL that truncated the last UTF-8 multi-byte letter ourselves in the loop and that is where this new loop terminating condition would help. ^ permalink raw reply [flat|nested] 9+ messages in thread
end of thread, other threads:[~2026-04-20 16:42 UTC | newest] Thread overview: 9+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2026-04-17 16:26 [PATCH] diff: fix out-of-bounds reads and NULL deref in diffstat UTF-8 truncation Elijah Newren via GitGitGadget 2026-04-17 19:21 ` Junio C Hamano 2026-04-17 22:00 ` Elijah Newren 2026-04-17 22:21 ` Junio C Hamano 2026-04-17 22:45 ` [PATCH v2] " Elijah Newren via GitGitGadget 2026-04-19 23:52 ` Lorenzo Pegorari 2026-04-20 14:51 ` Elijah Newren 2026-04-20 15:42 ` [PATCH v3] " Elijah Newren via GitGitGadget 2026-04-20 16:41 ` Junio C Hamano
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox